Author:
Garg Siya,Jindal Vinita,Bhatia Harshit,Johari Rahul,Gupta Shrey
Subject
Management Science and Operations Research,Computer Science Applications,Information Systems
Reference25 articles.
1. W. Stallings, Cryptography and network security principles and practices 4th edition; 2006.
2. N.A. Azeez, C.V. der Vyver, Security and privacy issues in e-health cloud-based system: A comprehensive content analysis, Egypt Inform J 21, vol. 02, pp. 97–108, 2019.
3. F.R. Shareef, A novel crypto technique based ciphertext shifting, Egypt Inform J 21, vol. 02, pp. 83–90, 2020.
4. A.K. Bairwa, S. Joshi, Mutual authentication of nodes using session token with fingerprint and mac address validation, Egypt Inform J 22, vol. 04, pp. 479–491, 2021.